1. Mell, P., Grance, T.: The NIST definition of cloud computing. Tech. Rep. Natl. Inst. Stan. Technol. 5, 1–16 (2011)
2. Sharma, S., Agrawal, J., Agarwal, S., Sharma, S.: Machine learning techniques for data mining: a survey. In: IEEE International Conference on Computational Intelligence and Computing Research, IEEE ICCIC, pp. 1–6 (2013)
3. Jha, J., Ragha, L.: Intrusion detection system using support vector machine. Int. J. Appl. Inf. Syst. (IJAIS) Foundation Comput. Sci. FCS New York USA 2, 25–30 (2013)
4. Chen, Q., Yang, J., Gou, J.: Image compression method using improved PSO vector quantization. 2, 490–495 (2005)
5. Li, L., Sun, H., Zhang, Z.: The research and design of honeypot system applied in the LAN security. In: IEEE 2nd International Conference on Software Engineering and Service Science (ICSESS), pp. 360–363 (2011)